OTPulse

Hitachi Energy UNEM

Plan Patch8.3ICS-CERT ICSA-23-005-01Jan 5, 2023
Attack VectorAdjacent
Auth RequiredNone
ComplexityHigh
User InteractionNone needed
Summary

Hitachi Energy UNEM contains multiple cryptographic weaknesses (CWE-326, CWE-321, CWE-319) affecting all versions from R9C through R16A. These vulnerabilities allow unauthorized users to obtain sensitive information and gain access to network elements managed by UNEM, and could cause availability issues. The vulnerabilities are remotely exploitable with low attack complexity and no authentication required. Partial remediation is available in UNEM R16A; full remediation for CVE-2021-40341 and CVE-2021-40342 is expected in an upcoming release.

What this means
What could happen
An attacker on the network segment hosting UNEM could intercept encrypted communications, extract sensitive credentials or configuration data, and gain unauthorized control over network management functions that supervise the power system, potentially causing service outages or data theft.
Who's at risk
Energy utilities and operators of Hitachi Energy UNEM network management systems (all versions R9C through R16A). This includes generation facilities, transmission control centers, and distribution management staff responsible for monitoring and controlling power system elements. Any organization using UNEM for network element management in the power grid is affected.
How it could be exploited
An attacker with network access to the UNEM management interface could exploit weak cryptographic implementations to intercept and decrypt NMS client-server communications, extract embedded credentials, or compromise authentication mechanisms. Once inside, they could modify network element configurations, escalate privileges, or disrupt power management operations.
Prerequisites
  • Network access to UNEM management interface or client-server communication channels
  • No valid credentials required for exploitation
  • Ability to observe or intercept network traffic between NMS clients and UNEM server
remotely exploitableno authentication requiredlow attack complexitycryptographic implementation flawsno patch available for most versionsaffects critical energy sector infrastructure
Exploitability
Low exploit probability (EPSS 0.5%)
Affected products (9)
1 with fix8 EOL
ProductAffected VersionsFix Status
UNEM: UNEM R16AR16AR16A
UNEM: UNEM R15BR15BNo fix (EOL)
UNEM: UNEM R15AR15ANo fix (EOL)
UNEM: UNEM R14BR14BNo fix (EOL)
UNEM: UNEM R14AR14ANo fix (EOL)
UNEM: UNEM R11BR11BNo fix (EOL)
UNEM: UNEM R11AR11ANo fix (EOL)
UNEM: UNEM R10CR10CNo fix (EOL)
Remediation & Mitigation
0/7
Do now
0/3
WORKAROUNDImplement firewall rules to restrict access to UNEM management interfaces to only authorized network management workstations
HARDENINGEncrypt NMS client-server communications using secure, well-vetted protocols (TLS 1.2 or higher with strong ciphers)
HARDENINGRestrict UNEM server and workstation access to authorized personnel only; enforce role-based access control on system configuration files
Schedule — requires maintenance window
0/3

Patching may require device reboot — plan for process interruption

HOTFIXUpgrade to UNEM R16A to obtain partial remediation of CVE-2021-40341 and CVE-2021-40342, and watch for upcoming release with complete remediation
HARDENINGRemove or disable embedded FOXCST authentication; use RADIUS-based authentication with centralized credential management instead
HARDENINGImplement secure procedures for handling exported UNEM configuration files (encryption, access control, integrity checking)
Mitigations - no patch available
0/1
The following products have reached End of Life with no planned fix: UNEM: UNEM R15B, UNEM: UNEM R15A, UNEM: UNEM R14B, UNEM: UNEM R14A, UNEM: UNEM R11B, UNEM: UNEM R11A, UNEM: UNEM R10C, UNEM: UNEM R9C. Apply the following compensating controls:
HARDENINGPhysically isolate UNEM management network from internet and non-control system networks using network segmentation and firewall configuration
↑↓ Navigate · Esc Close
API: /api/v1/advisories/534508ae-0e51-4e47-b85e-f1317e54260b
Hitachi Energy UNEM | CVSS 8.3 - OTPulse